Voelker Security
Voelker Security
CSE 291
Fall 2005
October 5, 2005
Geoffrey M. Voelker
Administrivia
Communication
Add yourself to the mailing list
Join the wiki, contribute to the discussion
Groups
Use the breaks today to start finalizing groups
Email Jeff Bigham your group info tonight
For those unassigned, we’ll match with groups on Friday
Red Team project
Exploit buffer overflow vulnerability, discuss policy implications
Overview on course page, programming details on Friday
Out Friday 10/7, due Monday 10/24
There are a handful of key issues here (paraphrasing
Butler Lampson)
Identity
Policy
Risks/Threats
Deterrence/Policy
Locks
Several classes of locks
Cryptographic
Software security
Protocol security
encryption decryption
Plaintext Ciphertext Plaintext
Cryptographer: Invents cryptosystems
Cryptanalyst: Breaks cryptosystems
Cryptology: Study of cryptosystems
Cipher: Mechanical way of encrypting text
Code: Semantic translation
“eat breakfast tomorrow” = “attack on Thursday”
What else might your enemy know?
The kind of encryption function you are using
Some plaintext-ciphertext pairs from last year
Ciphertext for plaintext the enemy selected
Some information about how you choose keys
What do we mean by “cannot recover plaintext”?
Ciphertext contains no information about plaintext
No “efficient” computation could make a reasonable guess
Sender & receiver use the same key
Key must remain private (i.e., secret)
Also called symmetric or secret key cryptography
Examples
DES, Triple-DES, Blowfish, Twofish, AES, Rijndael, …
Alice Bob
KAB{Hello!}
KAB KAB
Alice Bob
KAB{Hello!}
KAB{Hi!}
KAB KAB
Alice Bob
KB{Hello!}
KA{Hi!}
KA,KB KA,KB
kA kB
Integrity property next
How does Alice know that what she received is what Bob
sent?
How does Amazon know that no one corrupted credit card
info in transit?
Authentication next
How does Alice know that she is actually talking with Bob?
Are you actually sending your credit card to Amazon?
September 18, 2020 CSE 291 – Computer Security Primer 32
© 2005 Geoffrey M. Voelker
Signatures
Consider a paper check used to transfer money from
one person to another
Signature confirms authenticity
Only legitimate signer can produce signature (true?)
In case of alleged forgery
3rd party can verify authenticity (maybe?)
Checks are cancelled
So they can’t be reused
Checks are not alterable
Or alterations are easily detected
kA{msg}
Transformation of threats and capabilities
National Interest
Personal Gain
Personal Fame
Curiosity Vandal
Personal Gain
Trespasser
Personal Fame
Personal Gain
Trespasser
Personal Fame
National Interest
Trespasser
Personal Fame
Trespasser
Personal Fame
Trespasser
Personal Fame
Tools created
by experts
Trespasser now used by
Personal Fame
less skilled
attackers and
criminals
Curiosity Vandal Author
Tools created
by experts
Trespasser now used by
Personal Fame
less skilled
attackers and
criminals
Curiosity Vandal Author